Ransomware is also getting in to business systems through the vulnerability of operating systems and software. Targeted attacks are being delivered on outdated security software or system software.
Life was so simple, then Equifax, SEC, Whole Foods, Deloitte all hacked!
I have been getting calls and emails for the last few weeks about all the hacks and cyber events. The central question is always, “what do I do to protect myself?” It’s actually an impossible question to answer.
Defining CUI – Controlled Unclassified Information for the Manufacturing Segment
The definition of CUI, or Controlled Unclassified Information, by the Department of Defense is challenging for most small and medium manufactures to grapple.
Corporate Cyber Incident Response Plan – Do You Even Have One?
I was messaging with a very good friend and colleague this week and we started chatting about incident response plans. We noted that most people have a plan in place at home; he raised examples around personal security elements such as home alarms, dogs, door locks and cameras.
“Flipper” role in protection of our resources – it’s an IoT fish story!
Many may remember the TV series, “Flipper.” For those who do not remember, the theme and plot is as follows: Flipper, a bottle-nose dolphin, helps to protect his lagoon park and preserve its wild inhabitants. He is instrumental in apprehending criminals and thugs in the park. How does this story draw parallels to cybersecurity?
- Page 2 of 2
- 1
- 2